Apparatus and method for tracking data in edge cloud environment

    公开(公告)号:US11381489B1

    公开(公告)日:2022-07-05

    申请号:US17537098

    申请日:2021-11-29

    摘要: A data tracking method, which is performed by a data tracking apparatus in an edge cloud environment including at least one edge node communicating with an end device and a central cloud, includes receiving data from the end device by a first edge node, creating, by the first edge node, a tracing history and distributing the data to a plurality of edge nodes so as to allow the plurality of edge nodes to create tracing histories, transmitting the created tracing histories to the central cloud by the first edge node and the plurality of edge nodes, and verifying, by the central cloud, linkability of the tracing histories transmitted to the central cloud, storing the tracing histories, analyzing the tracing histories, and providing a data tracking function.

    Apparatus and method for verifying the integrity of video file

    公开(公告)号:US10382835B2

    公开(公告)日:2019-08-13

    申请号:US15976754

    申请日:2018-05-10

    摘要: Provided are an apparatus and method for verifying the integrity of a video file. The method includes receiving a video file and model information of a video recording device which is claimed to have recorded a verification-target video, extracting a header structure and a header value of the video file, extracting characteristic information according to the received model information of the video recording device from a characteristic database, and determining whether the extracted characteristic information according to the model information of the video recording device corresponds to the header structure and the header value of the video file.

    Device for detecting cyber attack based on event analysis and method thereof

    公开(公告)号:US09817969B2

    公开(公告)日:2017-11-14

    申请号:US14514516

    申请日:2014-10-15

    IPC分类号: G06F21/55 H04L29/06

    摘要: There are provided a device for detecting a cyber attack and a method thereof. The device for detecting a cyber attack includes an event receiving unit configured to receive an event generated in at least one user terminal according to a behavior of a user who accesses a web server and uses web services provided from a web page, a model generating unit configured to generate an event model by extracting an event pattern corresponding to a behavior of the user based on the received event, and an attack detecting unit configured to detect whether access of the web server by a specific user terminal is an attack by comparing the event model with an event received from the specific user terminal. Therefore, various forms of cyber attacks are rapidly and accurately detected, and it is possible to provide a security service having high availability and reliability.